Results 71 to 80 of about 10,775 (222)
The Network-on-Chip (NoC) plays an important role in high-speed and efficient communication in System-on-Chip architectures. However, the NoC topology can be extracted through reverse engineering attacks with the goal of making illegal copies or ...
Mona Hashemi +2 more
doaj +1 more source
In spite of recent remarkable advances in binary code analysis, malware developers are still using complex anti-reversing techniques to make analysis difficult.
Seokwoo Choi +3 more
doaj +1 more source
Breeding 5.0: Artificial intelligence (AI)‐decoded germplasm for accelerated crop innovation
ABSTRACT Crop breeding technologies are vital for global food security. While traditional methods have improved yield, stress tolerance, and nutrition, rising challenges such as climate instability, land loss, and pest pressure now demand new solutions.
Jiayi Fu +4 more
wiley +1 more source
From observation to understanding: A multi‐agent framework for smart microscopy
Abstract Smart microscopy represents a paradigm shift in biological imaging, moving from passive observation tools to active collaborators in scientific inquiry. Enabled by advances in automation, computational power, and artificial intelligence, these systems are now capable of adaptive decision‐making and real‐time experimental control.
P. S. Kesavan, Pontus Nordenfelt
wiley +1 more source
Cancer and Capitalism: Towards a Critical Sociological Agenda
ABSTRACT This article considers the relationship between cancer and capitalism from the perspective of political economy. It argues that this perspective is crucial for producing a critical agenda in the sociological study of cancer, which has otherwise and traditionally neglected the question of capital as social totality.
Faisal Al‐Asaad
wiley +1 more source
On the Security of Lightweight Homomorphic Obfuscation for Protecting Against Hardware Trojans
Hardware Trojan (HT) attacks pose a critical threat to modern microelectronics by enabling the leakage of sensitive information, such as cryptographic keys, or by inducing functional faults.
Tanvir Hossain +3 more
doaj +1 more source
ABSTRACT This article traces the transformation of global development from a discourse of aspirational equality to a regime of posthumanitarian militarism. It shows how aid, once framed as solidarity and progress, increasingly operates as an instrument of coercion, surveillance, and containment.
Salvador Santino Regilme
wiley +1 more source
Counter‐Stigmatization in the Digital Age: The Case of the Sex Tech Award Incident
Abstract Scholars have shown considerable interest in how organizations manage stigma when powerful actors discredit them and their products. However, research has paid less attention to how organizations might deflect stigma back onto their stigmatizers.
Neva Bojovic +2 more
wiley +1 more source
Driven by risk: Understanding reference‐dependent preferences using simulated auto racing
Abstract Using data from over 56,000 simulated auto races worldwide, we analyze risk‐taking at the margins, consistent with reference‐dependent preferences. We show that participants' risk‐taking changes when a desired intermittent outcome is presented, sometimes at the expense of a more favorable expected end state.
James Hilliard +2 more
wiley +1 more source
ABSTRACT Despite their transformative potential, Industrial Internet of Things (IIoT) platforms often fail to evolve into scalable ecosystems. Research on IIoT platforms attributes failure to discrete factors such as governance misalignment or technological complexity and rarely considers how failure unfolds.
Philipp Kernstock +3 more
wiley +1 more source

